This document describes an Unconstrained Endpoint Security System (UEPtSS) that uses passive scanning via the BRO intrusion detection system to fingerprint and catalog unmanaged endpoints on an enterprise network. It analyzes network traffic logs to determine key details about unmanaged devices including operating system, open ports, applications, browsers, and historical malware infections to provide useful context for incident response. The system leverages BRO's scripting framework to detect this information from log files and build an inventory without active scanning. This passive approach avoids potential denial of service issues and works regardless of when devices connect to the network.
Related topics: